Skip to content

Commit

Permalink
Merge pull request #3347 from splunk/remove-uncomatible-ds
Browse files Browse the repository at this point in the history
Remove Incompatible 4688 Data Sources
  • Loading branch information
patel-bhavin authored Feb 19, 2025
2 parents 5182ac3 + b68524f commit 292fba5
Show file tree
Hide file tree
Showing 9 changed files with 18 additions and 27 deletions.
5 changes: 2 additions & 3 deletions detections/endpoint/chcp_command_execution.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: CHCP Command Execution
id: 21d236ec-eec1-11eb-b23e-acde48001122
version: 4
date: '2024-11-13'
version: 5
date: '2025-02-19'
author: Teoderick Contreras, Splunk
status: production
type: TTP
Expand All @@ -15,7 +15,6 @@ description: The following analytic detects the execution of the chcp.exe applic
system compromise and data exfiltration.
data_source:
- Sysmon EventID 1
- Windows Event Log Security 4688
- CrowdStrike ProcessRollup2
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
as lastTime from datamodel=Endpoint.Processes where Processes.process_name=chcp.com
Expand Down
5 changes: 2 additions & 3 deletions detections/endpoint/jscript_execution_using_cscript_app.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Jscript Execution Using Cscript App
id: 002f1e24-146e-11ec-a470-acde48001122
version: 5
date: '2025-02-10'
version: 6
date: '2025-02-19'
author: Teoderick Contreras, Splunk
status: production
type: TTP
Expand All @@ -14,7 +14,6 @@ description: The following analytic detects the execution of JScript using the c
scripts, leading to code execution, data exfiltration, or further system compromise.
data_source:
- Sysmon EventID 1
- Windows Event Log Security 4688
- CrowdStrike ProcessRollup2
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
as lastTime from datamodel=Endpoint.Processes where (Processes.parent_process_name
Expand Down
5 changes: 2 additions & 3 deletions detections/endpoint/ping_sleep_batch_command.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Ping Sleep Batch Command
id: ce058d6c-79f2-11ec-b476-acde48001122
version: 6
date: '2025-02-10'
version: 7
date: '2025-02-19'
author: Teoderick Contreras, Splunk
status: production
type: Anomaly
Expand All @@ -15,7 +15,6 @@ description: The following analytic identifies the execution of ping sleep batch
exfiltration.
data_source:
- Sysmon EventID 1
- Windows Event Log Security 4688
- CrowdStrike ProcessRollup2
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
as lastTime from datamodel=Endpoint.Processes where `process_ping` (Processes.parent_process
Expand Down
5 changes: 2 additions & 3 deletions detections/endpoint/vbscript_execution_using_wscript_app.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Vbscript Execution Using Wscript App
id: 35159940-228f-11ec-8a49-acde48001122
version: 5
date: '2025-02-10'
version: 6
date: '2025-02-19'
author: Teoderick Contreras, Splunk
status: production
type: TTP
Expand All @@ -15,7 +15,6 @@ description: The following analytic detects the execution of VBScript using the
data exfiltration, or further lateral movement within the network.
data_source:
- Sysmon EventID 1
- Windows Event Log Security 4688
- CrowdStrike ProcessRollup2
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
as lastTime from datamodel=Endpoint.Processes where (Processes.parent_process_name
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Windows Command Shell DCRat ForkBomb Payload
id: 2bb1a362-7aa8-444a-92ed-1987e8da83e1
version: 6
date: '2025-02-10'
version: 7
date: '2025-02-19'
author: Teoderick Contreras, Splunk
status: production
type: TTP
Expand All @@ -15,7 +15,6 @@ description: The following analytic detects the execution of a DCRat "forkbomb"
disruption of services.
data_source:
- Sysmon EventID 1
- Windows Event Log Security 4688
- CrowdStrike ProcessRollup2
search: '| tstats `security_content_summariesonly` values(Processes.process) as process
values(Processes.parent_process) as parent_process values(Processes.parent_process_id)
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Windows Indirect Command Execution Via forfiles
id: 1fdf31c9-ff4d-4c48-b799-0e8666e08787
version: 4
date: '2024-11-13'
version: 5
date: '2025-02-19'
author: Eric McGinnis, Splunk
status: production
type: TTP
Expand All @@ -16,7 +16,6 @@ description: The following analytic detects the execution of programs initiated
compromise.
data_source:
- Sysmon EventID 1
- Windows Event Log Security 4688
- CrowdStrike ProcessRollup2
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
as lastTime from datamodel=Endpoint.Processes where Processes.parent_process="*forfiles*
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Windows Indirect Command Execution Via pcalua
id: 3428ac18-a410-4823-816c-ce697d26f7a8
version: 4
date: '2024-11-13'
version: 5
date: '2025-02-19'
author: Eric McGinnis, Splunk
status: production
type: TTP
Expand All @@ -15,7 +15,6 @@ description: The following analytic detects programs initiated by pcalua.exe, th
environment.
data_source:
- Sysmon EventID 1
- Windows Event Log Security 4688
- CrowdStrike ProcessRollup2
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
as lastTime from datamodel=Endpoint.Processes where Processes.parent_process="*pcalua*
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Windows Scheduled Task Service Spawned Shell
id: d8120352-3b62-4e3c-8cb6-7b47584dd5e8
version: 4
date: '2024-11-13'
version: 5
date: '2025-02-19'
author: Steven Dick
status: production
type: TTP
Expand All @@ -15,7 +15,6 @@ description: The following analytic detects when the Task Scheduler service ("sv
persistence, or escalate privileges within the environment.
data_source:
- Sysmon EventID 1
- Windows Event Log Security 4688
- CrowdStrike ProcessRollup2
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
as lastTime from datamodel=Endpoint.Processes where Processes.parent_process="*\\system32\\svchost.exe*"
Expand Down
5 changes: 2 additions & 3 deletions detections/endpoint/windows_time_based_evasion.yml
Original file line number Diff line number Diff line change
@@ -1,13 +1,12 @@
name: Windows Time Based Evasion
id: 34502357-deb1-499a-8261-ffe144abf561
version: 5
date: '2025-02-10'
version: 6
date: '2025-02-19'
author: Teoderick Contreras, Splunk
status: production
type: TTP
data_source:
- Sysmon EventID 1
- Windows Event Log Security 4688
- CrowdStrike ProcessRollup2
description: The following analytic detects potentially malicious processes that initiate
a ping delay using an invalid IP address. It leverages data from Endpoint Detection
Expand Down

0 comments on commit 292fba5

Please sign in to comment.